Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Agile!: The Good, the Hype and the Ugly
Agile!: The Good, the Hype and the Ugly

Are you attracted by the promises of agile methods but put off by the fanaticism of many agile texts? Would you like to know which agile techniques work, which ones do not matter much, and which ones will harm your projects? Then you need Agile!: the first exhaustive, objective review of agile principles, techniques and tools.

...

Cybercrime: Criminal Threats from Cyberspace (Crime, Media, and Popular Culture)
Cybercrime: Criminal Threats from Cyberspace (Crime, Media, and Popular Culture)

This book is an outstanding contribution to the interdisciplinary series on Crime, Media, and Popular Culture from Praeger Publishers. Because of the pervasiveness of media in our lives and the salience of crime and criminal justice issues, we feel it is especially important to provide a home for scholars who are engaged in innovative and...

Information Retrieval: Searching in the 21st Century
Information Retrieval: Searching in the 21st Century

In the forty years since I started working in the field, and indeed for some years before that (almost since Calvin Mooers coined the term information storage and retrieval in the 1950s), there have been a significant number of books on information retrieval. Even if we ignore the more specialist research monographs and the...

Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications
Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications
This book takes a novel approach to the presentation and understanding of a controversial topic in modern-day society: hacking. The term hacker was originally used to denote positively-motivated individuals wanting to stretch the capabilities of computers and networks. In contrast, the term cracker was a later version of the term,...
Holy War, Holy Peace: How Religion Can Bring Peace to the Middle East
Holy War, Holy Peace: How Religion Can Bring Peace to the Middle East
Part I: Analysis 1. The Interaction between Religion and Culture in Peace and Conflict 2. Family Myths and Cultural Conflict 3. Political and Mythic Interdependencies 4. Patterns of Abrahamic Incrimination 5. Conflict, Injury, and Transformation Part II: Practical Applications 6. Patterns of Abrahamic Reconciliation: Act, Ritual, and Symbol as...
Fields of Faith: Theology and Religious Studies for the Twenty-first Century
Fields of Faith: Theology and Religious Studies for the Twenty-first Century
How will the study of theology and the religions in higher education be shaped in the coming century? This book offers several different perspectives on this field of study with suggestions for a future in which theology and religious studies are pursued together. There are examples of the interplay of theology and religious studies with reference...
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook

Complete coverage of e-discovery, a growth market, from the people that run the TechnoForensics annual tradeshow.

This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can
...

House of Cards and Philosophy: Underwood's Republic (The Blackwell Philosophy and Pop Culture Series)
House of Cards and Philosophy: Underwood's Republic (The Blackwell Philosophy and Pop Culture Series)

Is Democracy overrated?

Does power corrupt? Or do corrupt people seek power?

Do corporate puppet masters pull politicians’ strings?

Why does Frank talk to the camera?

Can politics deliver on the promise of justice?

...
Electronic Monitoring in the Workplace: Controversies and Solutions
Electronic Monitoring in the Workplace: Controversies and Solutions

Due to the use of new technologies, coupled with the fact that there is an increasing amount of work being done online, whether on the Internet, intranets, LANs or other networks, extensive employee monitoring by employers is inexpensive and easy. Employers have legitimate concerns about the efficiency of their employees and the quality of the...

Issues and Trends in Technology and Human Interaction (Advances in Technology and Human Interaction)
Issues and Trends in Technology and Human Interaction (Advances in Technology and Human Interaction)
purposes of humans. It often has unintended and unexpected effects on humans and can be used for purposes other than originally planned. While technology cannot exist without humans, one can equally well argue that humans cannot exist without technology. This relationship touches on many fundamental questions of anthropology, ontology, and...
Neighbor Law: Fences, Trees, Boundaries and Noise
Neighbor Law: Fences, Trees, Boundaries and Noise
The world is full of barking dogs and trespassing trees, spite fences and 2 a.m. rock fests, but your neighbor's lack of consideration needn't be your lifelong headache. The Nolo Press guide to Neighbor Law, eruditely and accessibly written by attorney Cora Jordan, explains all the laws relevant to noise, obstructed views, and...
Emerging Optical Network Technologies: Architectures, Protocols and Performance
Emerging Optical Network Technologies: Architectures, Protocols and Performance
Optical networks have moved from laboratory settings and theoretical research
to real-world deployment and service-oriented explorations. New technologies
such as Ethernet PON and optical packet switching are being explored,
and the landscape is continuously and rapidly evolving. Some of the
key issues involving these new
...
Result Page: 13 12 11 10 9 8 7 6 5 4 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy